[go: up one dir, main page]

CN110378145A - A kind of method and electronic equipment of sharing contents - Google Patents

A kind of method and electronic equipment of sharing contents Download PDF

Info

Publication number
CN110378145A
CN110378145A CN201910498149.XA CN201910498149A CN110378145A CN 110378145 A CN110378145 A CN 110378145A CN 201910498149 A CN201910498149 A CN 201910498149A CN 110378145 A CN110378145 A CN 110378145A
Authority
CN
China
Prior art keywords
electronic equipment
content
data
image data
sensitive
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910498149.XA
Other languages
Chinese (zh)
Other versions
CN110378145B (en
Inventor
邱泽令
黄卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201910498149.XA priority Critical patent/CN110378145B/en
Publication of CN110378145A publication Critical patent/CN110378145A/en
Priority to PCT/CN2020/095022 priority patent/WO2020248955A1/en
Application granted granted Critical
Publication of CN110378145B publication Critical patent/CN110378145B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0483Interaction with page-structured environments, e.g. book metaphor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04845Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation
    • G06T11/60Editing figures and text; Combining figures or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T15/003D [Three Dimensional] image rendering
    • G06T15/005General purpose rendering architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2200/00Indexing scheme for image data processing or generation, in general
    • G06T2200/24Indexing scheme for image data processing or generation, in general involving graphical user interfaces [GUIs]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Graphics (AREA)
  • Automation & Control Theory (AREA)
  • User Interface Of Digital Computer (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A kind of method and electronic equipment of sharing contents.This method comprises: the first electronic equipment is in the scene for sharing screen to the second electronic equipment, obtain the drawing data of first content to be drawn, drawing data based on first content, draws control layer, application layer, the corresponding content of system layer respectively, and synthesis obtains the image data of first content;It identifies control layer, application layer and the corresponding sensitive data of system layer in the drawing data of first content, and drawing data after desensitization process is handled is carried out to sensitive data;Based on drawing data after processing, control layer, application layer, the corresponding content of system layer are drawn respectively, and synthesis obtains the image data of the second content;First content is shown according to the image data of first content, and the image data of the second content is sent to the second electronic equipment.Sensitive data, and desensitization process can be more thoroughly identified from three control layer, application layer and system layer levels in this method, and the safety of sharing contents can be improved.

Description

A kind of method and electronic equipment of sharing contents
Technical field
This application involves the methods and electronic equipment of security technology area more particularly to a kind of sharing contents.
Background technique
As the function of electronic equipment is more and more abundant, more and more users are carried out by electronic equipment to other users Sharing contents, such as the user of electronic equipment A are realized by way of mirror image screen sharing on electronic equipment B sharing screen Hold, this mirror image screen, which shares mode, to be shown in all display contents on electronic equipment A on electronic equipment B, in this way The user for electronic equipment A inevitably occur, which is not intended to share to the privacy content of electronic equipment B, is also shown in electronic equipment B On, cause user's sensitive data of electronic equipment A to reveal.And current screen shares scheme, electronic equipment A is to electronic equipment B It before sharing contents, identifies sensitive application and the privacy information of sensitive application is handled, there are also in some schemes, sharing The bullet frame that control is related to sensitive data in the process is not shown on electronic equipment A, then by image file after treatment point Electron equipment B is enjoyed, identification sensitive data is not thorough enough in currently existing scheme, so the safety of sharing contents is to be improved.
Summary of the invention
The embodiment of the present application provides the method and electronic equipment of a kind of sharing contents, to realize the scene shared in screen In, improve the safety of sharing contents.
First aspect provides a kind of method of sharing contents, can be applied to first electronic equipment with display screen, First electronic equipment detect for the second electronic equipment share screen first operation, in response to first operation, establish with Communication connection between second electronic equipment.Then, the first electronic equipment obtains the drawing data of first content to be drawn, In, drawing data includes control layer, application layer, the position of the corresponding view of system layer, size, shows content, display properties, the Drawing data of one electronic equipment based on first content draws control layer, application layer, the corresponding content of system layer, synthesis respectively Obtain the image data of first content.First electronic equipment identify first content drawing data in control layer, application layer, with And the corresponding sensitive data of system layer, and drawing data after desensitization process is handled is carried out to sensitive data, and later, the first electricity Sub- equipment is based on drawing data after processing, draws control layer, application layer, the corresponding content of system layer respectively, and synthesis obtains second The image data of content.First electronic equipment shows first content according to the image data of first content on a display screen, and to Second electronic equipment sends the image data of the second content.
With this solution, on the one hand, the first electronic equipment is being drawn for before being shared with the content of the second electronic equipment, From three hierarch recognition sensitive datas such as control layer, application layer and system layer, compared to the prior art in individually from application layer The scheme of identification sensitive data is gone, the application can more thoroughly identify sensitive data, share so as to improve in screen The safety of sharing contents in scene.On the other hand, the application first identifies in be drawn first before drawing image data Hold for drawing data in sensitive data, and carry out desensitization process, compared to the prior art in being obtained after drafting Image data identifies that the scheme of sensitive data, the application are improving the safety of screen content sharing in screen sharing scene Meanwhile the processing time of sharing contents process can be saved.
Wherein, desensitization process can be, but not limited to include any one of following or multinomial: scratch except processing;Block processing;It hides Processing;Replace contents processing;Virtualization processing or mosaic processing.
In one possible implementation, the first electronic equipment can carry out at image the image data of the second content Reason, image data after being handled, then, image data after being handled to the second electronic equipment transmission.Wherein, image procossing can be with Identification first area is specifically included, and scratches the data except first area, the character format of the corresponding content of the data of first area It is matched with the character format of default privacy information.
With this solution, the first electronic equipment can be after the image data for obtaining the second content, can also be further Image data after image procossing is handled is carried out to the image data of the second content, so as to accurately identify sensitive data, It can be further improved and share the safety of sharing contents in scene in screen.Moreover, being identified by identification string format The sensitive data in one region, for the particular content for identifying the region, processing speed is faster.
In one possible implementation, the concrete mode of the first electronic equipment identification first area can be with are as follows: uses Artificial intelligence AI security model identifies the first area in the image data of the second content, wherein AI security model is according to tool There are the picture of privacy information label and the picture with normal tag to be trained.
In one possible implementation, above-mentioned image procossing can also include: the stingy first area except data into Row rendering processing.
With this solution, rendering processing is carried out to first area, may make according to after processing image data show when, display Content after having rendering is avoided due to scratching except the case where blank screen is presented in caused first area is handled, so as to promote user Experience.
In one possible implementation, the drawing data of a kind of first electronic equipment identification first content presented below In control layer, application layer and the corresponding sensitive data of system layer specific implementation: identify the drafting number of first content Security sensitive application in, security sensitive apply the application of the name-matches for Apply Names and the application of default security sensitive; Identify the security sensitive control in the drawing data of first content, security sensitive control is that the value of security attribute information is preset value Control, alternatively, security sensitive control is control with the name-matches of default security sensitive control;Identification first content is drawn System sensitive behavior in data processed;System sensitive behavior is matched with default sensitive behavior.Then, to the drafting number of first content Security sensitive in applies corresponding data, the corresponding data of security sensitive control and the corresponding data of system sensitive behavior Carry out desensitization process, drawing data after being handled.
With this solution, application layer, control layer, the sensitive data in system layer can accurately be identified.
Second aspect provides a kind of method of sharing contents, can be applied to second electronic equipment with display screen. When receiving the request of the sharing screen from first electronic equipment, the second electronic equipment is established and first electronics Communication connection between equipment, then, the second electronic equipment can receive image data after the processing from the first electronic equipment, Image data includes the stingy first area except data after processing, later, is carried out to the first area in image data after processing Rendering processing, and according to by rendering, treated that image data shows the second content on a display screen.
With this solution, image data includes the stingy first area except data after the processing that the first electronic equipment is sent, First electronic equipment does not render first area, but carries out rendering processing by the second electronic equipment, compared to first Electronic equipment is sent to the second electronic equipment by rendering treated image data, and the program can reduce the first electronic equipment The data volume of data is sent to the second electronic equipment.
The third aspect provides the graphic user interface GUI in a kind of electronic equipment, which has display screen, storage Device, one or more processors, one or more of processors are stored in one or more of the memory for executing Computer program, the graphic user interface may include: that the above-mentioned first aspect of electronic equipment execution and first aspect are any Method in possible implementation, or the graphic user interface shown when the execution such as method of above-mentioned second aspect offer.
Fourth aspect provides a kind of electronic equipment, including processor and memory;Memory is stored with one or more meters Calculation machine program;When one or more computer programs of memory storage are executed by processor, electronic equipment is held The row such as method in above-mentioned first aspect and any possible implementation of first aspect, or execute as above-mentioned second aspect mentions The method of confession.
It should be noted that the memory can integrate in processor, it is also possible to independently of except processor.
5th aspect provides a kind of computer readable storage medium, which has computer journey Sequence, when computer program is run on an electronic device, so that electronic equipment executes such as above-mentioned first aspect and first aspect Method in any possible implementation, or the method provided such as above-mentioned second aspect is provided.
6th aspect a kind of computer program product comprising instruction is provided, when computer program product on an electronic device When operation, so that electronic equipment executes the method in such as above-mentioned first aspect and any possible implementation of first aspect, Or execute the method provided such as above-mentioned second aspect.
In addition, technical effect brought by second aspect to the 6th any possible implementation of aspect can be found in first Technical effect brought by different implementations in aspect, details are not described herein again.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application;
Fig. 2 is the schematic diagram of a graphic user interface on the display screen of electronic equipment provided by the embodiments of the present application;
Fig. 3 A is a kind of structural schematic diagram of software program provided by the embodiments of the present application;
Fig. 3 B is the structural schematic diagram of another software program provided by the embodiments of the present application;
Fig. 4 is a kind of sharing contents process schematic provided by the embodiments of the present application;
Fig. 5 A is the graphic user interface schematic diagram that a kind of triggering screen provided by the embodiments of the present application is shared;
Fig. 5 B is the graphic user interface schematic diagram that another triggering screen provided by the embodiments of the present application is shared;
Fig. 6 is display system hierarchical diagram provided by the embodiments of the present application;
Fig. 7 A is the schematic diagram of a graphic user interface provided by the embodiments of the present application;
Fig. 7 B is the schematic diagram of another graphic user interface provided by the embodiments of the present application;
Fig. 7 C is the schematic diagram of another graphic user interface provided by the embodiments of the present application;
Fig. 7 D is the schematic diagram of another graphic user interface provided by the embodiments of the present application;
Fig. 7 E is the schematic diagram of another graphic user interface provided by the embodiments of the present application;
Fig. 7 F is the schematic diagram of another graphic user interface provided by the embodiments of the present application;
Fig. 8 is the study and foundation of AI model provided by the embodiments of the present application and the flow diagram used;
Fig. 9 is a kind of method flow schematic diagram of sharing contents provided by the embodiments of the present application.
Specific embodiment
In order to keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the application make into One step it is described in detail.Concrete operation method in embodiment of the method also can be applied to Installation practice or system embodiment In.Wherein, in the description of the present application, unless otherwise indicated, the meaning of " plurality " is two or more.
It should be noted that the terms "and/or", only a kind of incidence relation for describing affiliated partner, is indicated There may be three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A and B, individualism B these three Situation.In addition, character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or" unless otherwise specified herein.And In the description of the embodiment of the present application, the vocabulary such as " first ", " second " are only used for distinguishing the purpose of description, and should not be understood as Indication or suggestion relative importance can not be interpreted as indication or suggestion sequence.
Electronic equipment introduced below, graphic user interface (the graphical user for such electronic equipment Interface, GUI) and embodiment for using such electronic equipment.In some embodiments of the application, electronic equipment It can be mobile phone, tablet computer, notebook computer or the wearable device (such as smartwatch or intelligence that have wireless communication function Energy glasses etc.) etc..The electronic equipment includes device (such as the processor, or, at application that can run drawing image data capability Device is managed, or, image processor, or, other processors), and it is capable of the device (such as display screen) of display image data.The electricity The exemplary embodiment of sub- equipment includes but is not limited to carryOr other operation systems The equipment of system.Above-mentioned electronic equipment is also possible to other portable devices, as long as the portable device may be implemented to identify wait draw Sensitive data in the content of system carries out desensitization process and drawing image data to sensitive data, and shares to other equipment Image data.It is to be further understood that above-mentioned electronic equipment may not be just in some other embodiment of the application Portable device, and can be achieved on the sensitive data identified in content to be drawn, to sensitive data carry out desensitization process and Drawing image data, and to other equipment share image data desktop computer.
This application involves first content and the second content can be the contents of the forms such as picture, video or text, after Text is not repeating.
Certainly, in other embodiments of the application, electronic equipment, which also may not need to have, identifies content to be drawn In sensitive data, the abilities of desensitization process and drawing image data is carried out to sensitive data, it is only necessary to there is display image The ability of data.For example electronic equipment can receive the image data that other equipment are sent, and then show the image data. Hereinafter, the application with the first electronic equipment be with the sensitive data identified in content to be drawn, to sensitive data into Row desensitization process and drawing image data function, and have the function of to be said for sharing image data to other equipment Bright, the second electronic equipment is illustrated at least having the function of display image data.
It should be noted that in the embodiment of the present application by the first electronic equipment to for the second electronic equipment sharing contents into Row explanation, it should be appreciated that it is same to a number of other electronic equipments that scheme provided by the embodiments of the present application is also applied for the first electronic equipment When sharing contents scene, for example the first electronic equipment is simultaneously to the second electronic equipment, third electronic equipment and the 4th electronics Equipment shares screen, and the first electronic equipment can refer to the first electronic equipment to the scheme of each other electronic equipment sharing contents To the scheme of the second electronic equipment sharing contents.
With reference to the accompanying drawing, the structure of above-mentioned electronic equipment is further illustrated.
The hardware structural diagram of electronic equipment 100 may refer to shown in Fig. 1, and Fig. 1 illustrates only the embodiment of the present application and mentions The hardware structural diagram of a kind of electronic equipment of confession on the basis of shown in Fig. 1, can also have other modification structures modes to deposit ?.As shown in Figure 1, electronic equipment 100 may include processor 110, external memory interface 120, internal storage 121 leads to With universal serial bus (universal serial bus, USB) interface 130, charge management module 140, power management module 141, Battery 142, antenna 1, antenna 2, mobile communication module 151, wireless communication module 152, audio-frequency module 191 (including loudspeaker, by Device is talked about, microphone, earphone interface etc. is not shown in Fig. 1), sensor module 180, key 190, display screen 194 and user Mark module (subscriber identification module, SIM) card interface 195 etc..Wherein sensor module 180 can To include pressure sensor 180A, range sensor 180F, close to optical sensor 180G, fingerprint sensor 180H, touch sensing (electronic equipment 100 may also include other sensors such as temperature sensor, ambient light sensor, gyro sensors to device 180K etc. Device etc., is not shown in Fig. 1).
It is understood that the structure of the embodiment of the present application signal does not constitute the specific restriction to electronic equipment 100.? In other embodiments of the application, electronic equipment 100 may include than more or fewer components shown in Fig. 1, or Certain components are combined, certain components or different component layouts are perhaps split.Component shown in FIG. 1 can be with hardware, soft The combination of part or software and hardware is realized.
The component having below to electronic equipment 100 shown in fig. 1 describes in detail.
Processor 110 may include one or more processing units, for example, processor 110 may include application processor (application processor, AP), modem processor, graphics processor (graphics processing Unit, GPU), image-signal processor (image signal processor, ISP), controller, memory, coding and decoding video Device, digital signal processor (digital signal processor, DSP), baseband processor and/or Processing with Neural Network Device (neural-network processing unit, NPU) etc..Wherein, different processing units can be independent device, Also it can integrate in one or more processors.Wherein, controller can be in the nerve center and commander of electronic equipment 100 The heart.Controller can generate operating control signal according to instruction operation code and clock signal, complete instruction fetch and execute instruction Control.
Memory can also be set in processor 110, for storing instruction and data.In some embodiments, processor Memory in 110 is cache memory.The memory can save the instruction that processor 110 is just used or is recycled Or data.If processor 110 needs to reuse the instruction or data, can be called directly from the memory, so as to Repeated access is avoided, the waiting time of processor 110 can be reduced, thus the efficiency of system can be improved.
Below with reference to this application involves screen share scene, illustratively can to the processor 110 in electronic equipment 100 The function of execution is introduced.
In the scene that electronic equipment 100 shares screen to electronic equipment 200, i.e., electronic equipment 100 is to share equipment, electricity Sub- equipment 200 is receiving device.Electronic equipment 100 is corresponding the first electronic equipment hereinafter, under electronic equipment 200 corresponds to The second electronic equipment in text.
Electronic equipment 100 is showing that the main interface as shown in 2a in Fig. 2, main interface may include status bar 210, can hide Navigation bar 220, time and weather widgets (widget) 230 and the icon 240 of various applications, such as picture library 241, electricity Sub- the mail icon, short message icon, browser icon, wechat icon, setting icon etc..It include name of operator in status bar 210 Title (such as China Mobile), mobile network (such as 4G), time and remaining capacity etc..It may include retreating in navigation bar 220 (back) key icon, main screen (home) key icon and advance key icon.At this point, electronic equipment 200 is also shown such as 2a institute in Fig. 2 The main interface shown.
When electronic equipment 100 receives wechat message, middle 2b, the display screen 194 of electronic equipment 100 are shown referring to fig. 2 Notice plays frame 250, and the wechat message " weekend watches movie together " that Jacky is sent is shown in the notice bullet frame 250, electronics is set The wechat message is privacy information for standby 100 user, and the user of electronic equipment 100 is not intended to the use of electronic equipment 200 The privacy information (i.e. notice plays the wechat message in frame 250) is seen at family, so the processor 110 of electronic equipment 100 can be drawn Two parts of different image datas are made, a copy of it image data (the referred to as image data of first content) is used in electronic equipment Show that content all in 2b in such as Fig. 2, another image data (the referred to as image data of the second content) are used in electricity on 100 Sub- equipment 200 shows the content in Fig. 2 in 2b in addition to notice plays frame 250, and the user of such electronic equipment 200 would not see The content of the notice bullet frame 250, so as to avoid electronic equipment 100 privacy information leakage.
The process that processor 110 draws the image data of first content is described below.
The drawing data of the available first content to be drawn of processor 110, and according to the drawing data of first content The image data of first content is drawn, then first content can be shown according to the image data of first content.Wherein, in first The drawing data of appearance may include position, size, display content, display properties of the corresponding view of each layer etc., wherein in display Holding to be text, picture, the background etc. in view, and display properties may include layout type, alignment thereof, display mode (for example hide, is visible), display effect (such as display font, font size, picture transparency etc.), application message, safety control Part attribute etc..
Illustratively, first content is all the elements on the interface as shown in 2b in Fig. 2, the drawing data of first content Position, size, display content and display properties including the corresponding view of each level such as control layer, application layer, system layer.
As shown in 2b in Fig. 2, the corresponding view of control layer include various applications icon 240 and the time and weather it is small Component (widget) 230.The corresponding view of application layer includes the background in main interface.The corresponding view of system layer includes status bar 210, suppressible navigation bar 220 and notice play frame 250.Processor 110 can draw control layer, application layer, system respectively The corresponding content of layer, does not limit drawing order herein, that is to say, that can according to control layer, application layer, the sequence of system layer according to Secondary drafting can also be drawn in another order.Then, processor 110 will draw obtained control layer, application layer, system The corresponding content of layer is synthesized, and the image data of first content is obtained.Wherein, first content image data is such as 2b in Fig. 2 Shown in the corresponding all pixels point of content rgb value.
Processor 110 can also control display screen and show first content according to the image data of first content.
The process that processor 110 draws the image data of the second content is described below.
Processor 110 can also identify that control layer, application layer and system layer in the drawing data of first content are corresponding Sensitive data, specific identification method may refer to introduction hereinafter, and details are not described herein again.
Illustratively, the content as shown in 2b in Fig. 2 identifies that sensitive data plays frame 250 for notice, then processor 110 can also be to the progress desensitization process of the sensitive data in the drawing data in first content, drawing data after being handled, In, desensitization process can for sensitive data scratch remove, replace, block, hide, blur, mosaic etc. is any or appoints multinomial Processing.Illustratively, the content that can be played in frame 250 to notice carries out desensitization process, and then, processor 110 can be based on processing Drawing data afterwards draws control layer, application layer, the corresponding content of system layer respectively, does not limit drawing order herein, that is, It says, can successively draw, can also be drawn in another order according to control layer, application layer, the sequence of system layer.Then, Processor 110 synthesizes the control layer that drafting obtains, application layer, the corresponding content of system layer, obtains the figure of the second content As data.Wherein, the image data of the second content be the content such as 2b in Fig. 2 shown in except notice bullet frame 250 in addition to content pair The rgb value for all pixels point answered.
Processor 110 can also control the picture number that wireless communication module 152 sends the second content to electronic equipment 200 According to.
Correspondingly, electronic equipment 200 receive electronic equipment 100 transmission the second content image data after, according to The image data of second content shows the second content.
Optionally, the safeties of sharing contents is improved in scene further to share in screen, processor 110 can also be After drafting obtains the image data of the second content, the security sensitive content in the image data of the second content is carried out at image Reason, image data after being handled.Including the data of each control region in the image data of the second content, wherein Image procossing specifically: the first area in the image data of the second content of identification, the image data of first area are corresponding aobvious Show that the character format of content is matched with the character format of default privacy information, illustratively, the image of the second content can be traversed The data of the data of each control region in data, each control region may include the display content in the region, Identify the region of the matched display content of the character format of character format and default privacy information, as first area, then Scratch the data of the first area in the image data except the second content.
Processor 110 such as can also be encoded to image data after processing, be encrypted at the processing, be then forwarded to electronics later and set Standby 200.
Internal storage 121 can be used for storing computer executable program code, and the executable program code includes Instruction.Processor 110 is stored in the instruction of internal storage 121 by operation or execution, thereby executing each of electronic equipment 100 Kind functional application and data processing.Internal storage 121 may include storing program area and storage data area.Wherein, it stores It program area can application program needed for storage program area, at least one function (such as sound-playing function, image player function Deng) etc..Storage data area can store created in 100 use process of electronic equipment data (such as audio data, phone directory, Webpage, image data etc.) etc..In addition, internal storage 121 may include high-speed random access memory, can also wrap Include nonvolatile storage, such as disk memory, flush memory device or other non-volatile solid state memory parts etc..Storage inside Device 121 can also store various operating systems, such as Apple Inc. is developedOperating system, Google are developed 'sOperating system etc..
Internal storage 121 can be also used for storing the program code of sharing contents algorithm provided by the embodiments of the present application. When processor 110 accesses and runs the program code of sharing contents algorithm, the display screen in electronic equipment 100 may be implemented First content is shown on 194, shares the second content to the second electronic equipment, i.e. it does not include sensitivity that the second content, which is in first content, The content of data.Wherein, internal storage 121 may include high-speed random access memory, can also include non-volatile deposit Reservoir, for example, at least a disk memory, flush memory device, generic flash memory (universal flash Storage, UFS) etc..
The function of sensor module 180 is described below.
Touch sensor 180K, also referred to as " touch panel ".Touch sensor 180K can be set under display screen 194 Side forms touch screen by touch sensor 180K and display screen 194, also referred to as " touch screen ".Touch sensor 180K is for detecting It is applied to it or neighbouring touch operation.The touch operation that touch sensor 180K can will test is passed to using processing Device, to determine touch event type.Visual output relevant to touch operation can be provided by display screen 194.At other In embodiment, touch sensor 180K also be can be set in the surface of electronic equipment 100, not with 194 location of display screen Together.
For example, touch sensor 180K detects that touch on the image is grasped when display screen 194 shows an image After making (such as clicking operation), which is sent to processor 110, processor 110 determines that the touch operation is corresponding Position coordinates (for example touch screen, when being capacitive touch screen, processor 110 determines that the touch operation is corresponding based on capacitance variations Coordinate position), i.e., user clicks the position coordinates on display screen, the figure that the corresponding object of the position coordinates, that is, user clicks As upper object is (alternatively, touch sensor 180K itself can determine the corresponding coordinate position of touch operation, by the touch operation Occur with the coordinate position to processor 110, processor 110 no longer needs to determine the corresponding coordinate position of touch operation).
Display screen 194 can be used for showing information input by user or be supplied to user information and various graphical users Interface, for example, photo, video, webpage or file etc. can be shown.Display screen 194 includes display panel.Display panel can To use liquid crystal display (liquid crystal display, LCD), Organic Light Emitting Diode (organic light- Emitting diode, OLED), active matrix organic light-emitting diode or active-matrix organic light emitting diode (active- Matrix organic light emitting diode's, AMOLED), Flexible light-emitting diodes (flex light- Emitting diode, FLED), Miniled, MicroLed, Micro-oLed, light emitting diode with quantum dots (quantum dot Light emitting diodes, QLED) etc..In some embodiments, electronic equipment 100 may include 1 or N number of display Shielding 194, N is the positive integer greater than 1.
In addition, electronic equipment 100 can by audio-frequency module 191 (loudspeaker, receiver, microphone, earphone interface), with And processor 110 etc. realizes audio-frequency function.Such as music, recording etc..Wherein, the sound that audio-frequency module 191 can will receive Electric signal after frequency data conversion, is transferred to loudspeaker, is converted to voice signal output by loudspeaker;On the other hand, microphone The voice signal of collection is converted into electric signal, audio data is converted to after being received by audio-frequency module, then audio data is exported To wireless communication module 152 to be sent to a such as terminal, or by audio data export to internal storage 121 so as into The processing of one step.
The wireless communication function of electronic equipment 100 can pass through antenna 1, antenna 2, mobile communication module 151, wireless communication Module 152, modem processor and baseband processor etc. are realized.
Antenna 1 and antenna 2 electromagnetic wave signal for transmitting and receiving.Each antenna in electronic equipment 100 can be used for covering Cover single or multiple communication bands.Different antennas can also be multiplexed, to improve the utilization rate of antenna.Such as: it can be by antenna 1 It is multiplexed with the diversity antenna of WLAN.In other embodiments, antenna can be used in combination with tuning switch.
Mobile communication module 151, which can provide, applies wirelessly communicating on electronic equipment 100 including 2G/3G/4G/5G etc. Solution.Mobile communication module 151 may include at least one filter, switch, power amplifier, low-noise amplifier (low noise amplifier, LNA) etc..Mobile communication module 151 can receive electromagnetic wave by antenna 1, and to received electricity Magnetic wave is filtered, and the processing such as amplification is sent to modem processor and is demodulated.Mobile communication module 151 can also be right The modulated modulated signal amplification of demodulation processor, switchs to electromagenetic wave radiation through antenna 1 and goes out.In some embodiments, it moves At least partly functional module of dynamic communication module 151 can be arranged in processor 110.In some embodiments, mobile logical At least partly functional module of letter module 151 can be arranged in the same device at least partly module of processor 110.
Wireless communication module 152, can provide apply on electronic equipment 100 include WLAN (wireless Local area networks, WLAN) (such as Wireless Fidelity (wireless fidelity, Wi-Fi) network), bluetooth (bluetooth, BT), Global Navigation Satellite System (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), the short distance wireless communication technology (near field communication, NFC) are red The solution of the wireless communications such as outer technology (infrared, IR).Wireless communication module 152 can be integrated into few communication One or more devices of processing module.Wireless communication module 152 receives electromagnetic wave via antenna 2, by electromagnetic wave signal frequency modulation And filtering processing, by treated, signal is sent to processor 110.Wireless communication module 152 can also connect from processor 110 Signal to be sent is received, frequency modulation is carried out to it, is amplified, is switched to electromagenetic wave radiation through antenna 2 and go out.
Electronic equipment 100 can also include Peripheral Interface, for input-output apparatus (such as the keyboard, mouse for outside Mark, external-connection displayer, external memory, subscriber identification module card etc.) various interfaces are provided.Such as pass through universal serial bus (USB) interface 130 is connect with mouse, passes through the SIM card of hard contact and operator's offer on subscriber identification module card card slot Connection.Peripheral Interface can be used to the input/output peripheral equipment of said external being couple to processor 110 and storage inside Device 121.
Electronic equipment 100 can also include charge management module 140 (such as battery 142 and the electricity powered to all parts Source control module 141), battery 141 can be logically contiguous by power management module 141 and processor 110, to pass through charging Management module 140 realizes the functions such as management charging, electric discharge and power managed.
Electronic equipment 100 can receive the input of key 190, generate the user setting and function control with electronic equipment 100 Make related key signals input.SIM card interface 195 in electronic equipment 100 is for connecting SIM card.SIM card can pass through insertion SIM card interface 195, or extracted from SIM card interface 195, realization is contacting and separating with electronic equipment 100.
Although being not shown in Fig. 1, electronic equipment 100 can also include camera, such as front camera, postposition image Head;It can also include motor, for generating vibration prompt (such as calling vibration prompt);It can also include that indicator such as indicates Lamp, is used to indicate charged state, and electric quantity change can be used for instruction message, missed call, notice etc..Electronic equipment 100 is also It may include blue-tooth device, positioning device, flash lamp, micro projector, near-field communication (near field Communication, NFC) device etc., it will not be described here.
Following embodiment can be realized in the electronic equipment 100 with above structure.
In the scene that electronic equipment 100 shares screen to electronic equipment 200, based on electronic equipment 100 shown in FIG. 1 Structural schematic diagram is stored with the first software program 310 referring to Fig. 3 A in internal storage 121, when electronic equipment 100 is to electricity When sub- equipment 200 (i.e. receiving device) shares screen, processor 110 can call first stored in internal storage 121 soft Part program 310 is simultaneously run, wherein the first software program 310 may include multiple functional modules, respectively discovery connection management mould Block 311, Streaming Media safety management module 312, multi-media module 313, data processing module 314 and data transmission module 315, respectively The function of a module is as follows:
It was found that connection management module 311, for realizing discovery, agreement to electronic equipment 200 negotiation and with reception The functions such as the connection of the communication channel between equipment.
Streaming Media safety management module 312, for realizing the sensitivity in the drawing data for identifying first content to be drawn Data are mainly identified from three levels such as control layer, application layer and system layer, wherein sensitive data may include peace Full sensitive control element, security sensitive application and system action associated safety sensitive behavior (also referred to as system sensitive behavior), later Desensitization process, drawing data after being handled are carried out to sensitive data.
In some embodiments, to the sensitive data progress desensitization process identified, there are many implementations, for example scratch and remove The sensitive data of each level, and make marks to the region scratched except sensitive data, the label is for being sent to coding in data When device is encoded, the region scratched except sensitive data is filled up or other processing.For another example, for where sensitive data Region is blocked or hides processing, or carries out filling up other contents to the corresponding region of sensitive data.Then, based on processing Drawing data afterwards, draw control layer, application layer, the corresponding content of system layer, then will draw obtain control layer, application layer, The corresponding content of system layer is synthesized, and the image data of the second content is obtained.
Multi-media module 313 for realizing the image data of the second content of crawl, and the image data of the second content is sent out Give data processing module 314.
Data processing module 314 carries out image procossing for realizing the image data to the second content, schemes after being handled As data.Wherein, image procossing is specifically as follows the first area in the image data of the second content of identification, the figure of first area It shows that the character format of content is matched with the character format of default privacy information as data are corresponding, then, scratches and remove the second content Image data in first area data.In some embodiments, the figure except the second content can be scratched by electronic equipment 100 Other contents are filled up as the data of the first area in data, and in first area, are sent to electronic equipment 200 later.Another In some embodiments, image data after processing can also be transmitted directly to electronic equipment 200 by electronic equipment 100, be set by electronics Standby 200 pairs have been scratched except the first area of data carries out filling up other contents, can reduce set in electronic equipment 100 with electronics in this way The data volume transmitted between standby 200.
Data processing module 314 processing such as can also be encoded to image data after processing, encrypt, encapsulate, be obtained Image data after the processing of encapsulation, and image data after the processing encapsulated is sent to data transmission module 315.
Data transmission module 315, for realizing image data after the processing encapsulated to receiving device transmission.
In the scene that electronic equipment 100 shares screen to electronic equipment 200, electronic equipment 200 is used as receiving device, electricity The structure of sub- equipment 200 can also be with reference to hardware structure diagram shown in Fig. 1.Referring to Fig. 3 B, deposited in the inside of electronic equipment 200 The second software program 320 is stored in reservoir, when electronic equipment 200 can be electric when receiving the content of sharing of other equipment The processor of sub- equipment 200 calls the second software program 320 stored in internal storage and runs, wherein the second software journey Sequence 320 may include multiple functional modules, respectively discovery connection management module 321, multi-media module 322, data processing mould Block 323 and data transmission module 324, the function of modules are as follows:
It was found that connection management module 321, for realizing the discovery of electronic equipment 100 (i.e. sharing equipment), the negotiation of agreement And the functions such as the connection in channel.
Data transmission module 324, for realizing image data after the processing encapsulated that electronic equipment 100 is sent is received.
Data processing module 323, for realizing being decapsulated, decrypting, solving to the image data encapsulated received Then image data after processing is sent to multi-media module 322 by the processing such as code, image data after being handled.Optionally, After the processing received there is the region scratched and removed data in image data, and data processing module 323 can also be to having scratched divisor According to region carry out filling up other contents, multi-media module 322 is then forwarded to, to avoid the region scratched except data in display User experience is influenced in blank screen.
Multi-media module 322 carries out rendering broadcasting for realizing to image data after processing.
In conjunction with above-described embodiment and attached drawing, the embodiment of the present application provides a kind of method of sharing contents, and this method can be It is realized in electronic equipment 100 with hardware configuration shown in FIG. 1.
Below using the first electronic equipment as equipment is shared, for the second electronic equipment is as receiving device, wherein first Electronic equipment and the second electronic equipment may have the hardware configuration of electronic equipment 100 shown in FIG. 1, below to the application reality The method for applying the sharing contents of example offer is introduced.
As described in foregoing teachings, during the first electronic equipment shares screen to the second electronic equipment, it may go out The case where existing leakage of private information, illustratively, by taking the user interface 701 that the first electronic equipment in Fig. 7 A is shown as an example, wherein Include setting sun picture in user interface 701, the bullet frame for prompting " someone sends file to you " is popped up in user interface 701 702, the first electronic equipment shares screen to the second electronic equipment at this time, then the second electronic equipment can be also shown in by playing frame 702 On, the user that the user of the first electronic equipment may be not intended to the second electronic equipment sees the content played in frame 702, thus It will cause sensitive data leakage.For another example showing user circle for logging in e-bank with the first electronic equipment in Fig. 7 B For face 711, user inputs bank card account number and password in input frame control 712, and the first electronic equipment is to second at this time Electronic equipment shares screen, then bank card account number and password can be also shown in the second electronic equipment, to cause bank The leakage of card Bank Account Number and password.
In order in the scene that screen is shared, improve the safety of sharing contents, the embodiment of the present application provides a kind of sharing The method of content, the first electronic equipment need to draw out before showing the corresponding user interface of first content to be drawn The image data of one content, is then delivered in display system and shows, the embodiment of the present application is being drawn in the second electronic equipment Before the image data of the content of middle display, sensitivity number present in the drawing data of first content to be drawn first is identified According to, specifically, control layer, application layer and the corresponding sensitive data of system layer in the drawing data of identification first content, and Drawing data after desensitization process is handled is carried out to sensitive data, based on drawing data after processing, control layer is drawn respectively, answers With layer, the corresponding content of system layer, synthesis obtains the image data of the second content, that is to say, that from control in the embodiment of the present application Three hierarch recognition sensitive datas such as part layer, application layer and system layer, compared to the prior art in individually go to know from application layer The scheme of other sensitive data, the application can more thoroughly identify sensitive data, share scene in screen so as to improve The safety of middle sharing contents.
Moreover, the application first identified before drawing image data first content to be drawn for drawing data in Sensitive data, and carry out desensitization process, compared to the prior art in the scheme to image data identification sensitive data, the application It is improving while screen shares the safety that screen content is shared in scene, when can save the processing of sharing contents process Between.
Further, it after the image data for obtaining the second content, the image data to the second content can also carry out again Image data after image procossing is handled can be further improved and shield so as to further accurately identify sensitive data Curtain shares the safety of sharing contents in scene.
Referring to fig. 4, a kind of process schematic of the sharing contents provided for application embodiment.
As shown in figure 4, the first electronic equipment obtains the drawing data of first content to be drawn, then according to first content Drawing data draws two parts of image datas, a copy of it are as follows: according to the drawing data of first content, according to control layer, application layer, And the image data of first content that system layer is drawn, the image data of the first content are used in the first electronic equipment Upper display;Another are as follows: the first electronic equipment according to the drawing data of first content, identify control layer therein, application layer, with And the corresponding sensitive data of system layer, and drawing data after desensitization process is handled, then root are carried out to the sensitive data According to drawing data after processing, draw to obtain the image data of the second content according to control layer, application layer and system layer, and right Second image data is encoded to obtain encoded images data, and encoded images data are sent to the second electronics later and are set It is standby.Second electronic equipment receives the encoded images data that the first electronic equipment is sent, and to the encoded images received Data are decoded, image data after being handled, and show image data pair after the processing in the display screen of the second electronic equipment The second content answered.
Wherein, the image data of the image data of first content and the second content may be identical, it is also possible to not identical.If It does not include sensitive data in first content to be drawn on first electronic equipment, then the image for the first content drawn Data are identical with the image data of the second content.If in the first content to be drawn on the first electronic equipment including sensitive number According to, then the image data of the image data for the first content drawn and the second content is not identical, wherein first content Image data includes sensitive data, does not include sensitive data in the image data of the second content.
It is to be appreciated that only by the first electronic equipment to for for the second electronic equipment sharing contents in above-mentioned Fig. 4 Bright, i.e. the first electronic equipment is to share equipment, and the second electronic equipment is receiving device.Certainly, the second electronic equipment can also be with To the first electronic equipment sharing contents, i.e., the second electronic equipment is to share equipment under this scene, and the first electronic equipment is to receive Equipment.
Below for the first electronic equipment to the second electronic equipment share screen for, to triggering screen share mode into Row is discussed in detail.
In order to make it easy to understand, the application following embodiment by with the first electronic equipment be Fig. 1 shown in structure electronic equipment For 100, triggering sharing process provided by the embodiments of the present application is specifically addressed in conjunction with attached drawing.
Mode one, using interior sharing ScreenMode, i.e. the first electronic equipment can be pressed by the screen sharing function in application Button gives the content share on screen to the second electronic equipment, introduces so that wechat is applied as an example how to realize that triggering screen is shared below Function.
(a) shows the graphic user interface GUI of electronic equipment 100 in Fig. 5 A, which is the master of electronic equipment 100 Interface 210.By taking wechat is applied as an example, when electronic equipment 100 detects the icon of the wechat application acted in main interface 210 501 operation (as clicked), starts wechat application in response to the operation, shows another GUI as shown in (b) in Fig. 5 A, should It include account control, password control and login control 502 in GUI.Control is logged in when electronic equipment 100 detects that user triggers The operation of part 502 shows that the another GUI as shown in (c) in Fig. 5 A, the GUI include contact person, search control in response to the operation Part and setting control 503 etc..It is aobvious in response to the operation when electronic equipment 100 detects the operation of triggering setting control 503 Show multiple controls, such as adding the control of friend, for sweeping the control swept, for bank settlement control and be used for It is shared with the control 504 of other equipment.When electronic equipment 100 detects triggering, this is used to be shared with the control 504 of other equipment Operation when, show the GUI505 as shown in (d) in Fig. 5 A in response to the operation, which includes multiple available devices The corresponding control of title, such as equipment A, equipment B, equipment C and equipment D.This is acted on when electronic equipment 100 detects The clicking operation of the corresponding control of the title of some available devices on GUI505, such as the corresponding control of pointing device C, response Show that the another GUI as shown in (e) in Fig. 5 A, the GUI are the GUI506 for including prompted dialog frame in the clicking operation, this is mentioned Show the prompt information and "Yes" and two controls of "No" included whether in dialog box by Screen sharing to equipment C.Wherein, such as Fruit electronic equipment 100 detects that the "Yes" control clicked in GUI507, electronic equipment 100 will be sent to equipment C to sharing data, It can show that one is used to refer to sharing data, while on the display screen 194 of electronic equipment 100 to which equipment C can be shown Show the prompt column (being not shown in Fig. 5 A) for sharing screen to equipment C.If detecting the "No" control clicked in GUI507, The display of the electronic equipment 100 such as GUI505 in (d) in Fig. 5 A, user can select other equipment to carry out screen in GUI 505 Share.
The triggering mode of aforesaid way one is suitable for the application with screen sharing function button, if do not had in Screen sharing function button, then can realize that triggering screen was shared in such a way that following manner two is global screen sharing Journey can also be shared under the scene of the application with screen sharing function button in the following way two triggering screens certainly Journey.
Mode two, global screen share mode, can realize that screen is shared by the multi-screen interactive icon in status bar.
If (a) in Fig. 5 B shows the graphic user interface GUI of electronic equipment 100, which is electronic equipment 100 Main interface 210.When electronic equipment 100 detects the slide downward operation acted on status bar 201, in response to the slide downward It may include multiple icons, such as wireless network icon, indigo plant in operation display another GUI as shown in (b) in Fig. 5 B, the GUI (Huawei share) icon, offline mode is shared by tooth icon, mobile data icon, vibration icon, automatic Rotating icon, Huawei Icon, flashlight icon, location information icon, screenshotss icon, eyeshield mode icon, hot spot icon and suspension navigation icon, Super power saving icon, screen recording icon, interruption-free icon, NFC icon and multi-screen interactive icon 511 etc., it should be appreciated that Fig. 5 B In these icons of (b) display can be more or less, the title of these icons is also with no restriction.It is with multi-screen interactive icon Example after electronic equipment 100 detects the operation for clicking the multi-screen interactive icon 511, may be implemented to share screen to other equipment Function, it should be noted that be only illustrated by taking " multi-screen interactive " this title as an example herein, but the application can realize triggering The icon name for sharing screen function is without being limited thereto, for example can also be known as " Screen sharing ", " wireless to share " etc..
After electronic equipment 100 detects the clicking operation for acting on the multi-screen interactive icon 511, grasped in response to the click Make the display another GUI as shown in (c) in Fig. 5 B, the GUI to be to include the GUI512 for searching for available devices, when electronics is set After standby 100 search available devices, showing that the another GUI as shown in (d) in Fig. 5 B, the GUI are includes available devices The GUI 513 of title.When electronic equipment 100 detects the title of some available devices on the click GUI513, in response to this Clicking operation shows that the another GUI as shown in (e) in Fig. 5 B, the GUI are the GUI514 for including prompted dialog frame, the prompt pair The prompt information and "Yes" and two controls of "No" by Screen sharing to equipment C are included whether in words frame.Wherein, work as electronics Equipment 100 detects the "Yes" control clicked in GUI514, and electronic equipment 100 will be sent to equipment C to sharing data, to set Standby C, which can be shown, can show that one is used to indicate to sharing data, while on the display screen 194 of electronic equipment 100 Share the prompt column of screen to equipment C.When electronic equipment 100 detects the operation for clicking the "No" control in GUI514, electricity Sub- equipment 100 shows that the GUI 513 in (d) in such as Fig. 5 B, user can select other to set in GUI 513 in response to the operation It is standby to carry out screen sharing.
Any one of above two triggering mode can realize that triggering electronic equipment 100 carries out screen to other equipment The process of sharing, triggering sharing contents process after, the processor 110 of electronic equipment 100 obtained from display system to The drawing data of the first content of drafting, and executing includes the image data for drawing the image data and the second content of first content Etc. processes, finally obtain the image data of the first content for showing on electronic equipment 100 and in the second electronic equipment Second content images data of display.
The process of 100 drawing image data of electronic equipment is described in detail below.
The display system of electronic equipment 100 can be layered and show with fragment, and referring to Fig. 6, layering can be divided into display system Three layers of control layer, application layer and system layer etc., wherein the control in control layer is the composition unit using display interface, each Control has an attribute setting of oneself, for example position, size, display layer are inferior, so display system can be according to the category of control Property is provided with the synthesis using display interface.It, can using display interface using may include one or more application display interface Including one or more controls and other contents, while applying display interface is also the display carrier of each control.And system User interface UI may include the interface using display interface and some system actions, and wherein the interface of system action may include Status bar, control group and some other control area (for example playing frame) etc..
Wherein, the drafting of control layer mainly draws the corresponding subregion of control in application, for answering With the drafting of layer mainly to drawing in application using display interface, the drafting for system layer is mainly to state Column, control group or other system control areas are drawn.So electronic equipment 100 is at drawing system interface (in i.e. first Hold) before, it needs successively to calculate the position of the element of each layer according to control layer, application layer, system layer, size, display content, show Show the information such as attribute (obtaining the drawing data of first content), is then calculated according to three layers of control layer, application layer, system layer etc. Obtained information draws control layer, application layer, the corresponding content of system layer respectively, and synthesis obtains the image data of system interface, The image data is shown as system interface on a display screen.
It, can before drawing the image data for the second content shown on the receiving device in the embodiment of the present application According to the drawing data of first content, the i.e. position of the corresponding view of each layer such as control layer, application layer, system layer, size, display The information such as content, display properties identify control layer, application layer, the corresponding sensitive data of system layer, and control to sensitive data System (such as desensitization process) handle after drawing data, be then based on drawing data after the processing, respectively drafting control layer, The corresponding content of application layer, system layer, synthesis obtains the image data of the second content, and the image data of the second content is sent To the second electronic equipment, so that the second electronic equipment can show the second content according to the image data of the second content, thus real Now improve the safety to receiving device sharing contents.
Below for control layer, application layer, three layers of system layer etc. of the sensitive number in the drawing data of identification first content According to process be described in detail.
Multiple applications may be installed in the first electronic equipment, an application may generate multiple in the process of running Using display interface, by taking one of application display interface (for example applying display interface A) as an example, this can using display interface A It can include multiple controls, some controls are security sensitive control, such as the first electronics shown in Fig. 7 C on this application interface A The input frame control 712 that the login interface 711 of the e-bank of the display screen display of equipment includes, for another example shown in Fig. 7 D The input frame control 722 that the login interface 721 of the social software of the display screen display of first electronic equipment includes, for another example schemes The income control 732 that the remaining sum interface 731 of the payment software of the display screen display of first electronic equipment shown in 7E includes, again For example the transaction prompting interface 741 of e-bank's software of the display screen display of the first electronic equipment shown in Fig. 7 F includes Transaction reminds control 742 and transaction to remind control 743, needs before sharing screen to the second electronic equipment quick to these safety Sensing control part carries out desensitization process, and some controls are not security sensitive controls, such as the secure log control 717 in Fig. 7 C, then For example the login control 725 in Fig. 7 D, these controls do not need to carry out desensitization process.This application involves security sensitive control be Accuse that content is related to the control of sensitive data, privacy information etc. in part, is not repeating hereinafter.
It describes in detail below for the sensitive data for how identifying control level.
In some embodiments, the first electronic equipment can be according to the title of default security sensitive control, from first content Drawing data in, the control with the name-matches of default security sensitive control is identified, as security sensitive control, wherein Include display properties in the drawing data of one content, includes the title of control in display properties, can be got from display properties The title of control to be identified, and be compared with the title of default security sensitive control, identify security sensitive control, then Desensitization process is carried out to security sensitive control.
In further embodiments, security attribute can be set for control in development and application, is obtained in the first electronic equipment When taking the drawing data of first content, security attribute can be got from display attribute information therein, is made in this way in user In the scene for sharing screen with the first electronic equipment, the first electronic equipment can identify that control is according to the security attribute of the control No is security sensitive control, if can show in receiving device, and optionally show when needing in receiving device display Show effect, desensitization process then is carried out to the control for being related to sensitive data.Wherein security attribute can include but is not limited to Under it is several:
Attribute one, if be the attribute of security sensitive control, whether this attribute can be used to indicate that the content in control It is related to sensitive data, wherein security sensitive control refers to that the content in control is related to sensitive data, such as password box control, key Disk control etc..
Illustratively, the value of attribute one can be used " being (True) " or " no (False) " to indicate, can also be otherwise It indicates, herein with no restriction.By taking control A as an example, wherein the value of the corresponding attribute one of control A is that "Yes" indicates that control A is peace Full sensitive control element, the value of the corresponding attribute one of control A are that "No" indicates that control A is not security sensitive control.Furthermore it is possible to controlling When part A is not security sensitive control, the value of the attribute one of setting control A is "No", can not also set a property one for control A.
In specific implementation, the value that can determine the attribute one, is "Yes" when being worth, and carries out desensitization process to control A, when Value is "No" or the value for the attribute one for not finding control A, it is believed that control A is not related to sensitive data, subsequent to draw Make control A.
Attribute two, if in the attribute that receiving device is shown, this attribute can be used to indicate that whether control needs connecing Receiving unit is shown.
Illustratively, " being (True) " or " no (False) " can be used in the value of attribute two, can also otherwise carry out table Show, herein with no restriction.By taking control A as an example, for example, the value of the corresponding attribute two of control A is that "Yes" indicates that control A is needed remote End display, the value of the corresponding attribute two of control A are that "No" indicates that control A does not need to show in receiving device, at this time can will not Control A is hidden processing, covering treatment etc. to control A.
Before drawing control A, can first determine the value of the attribute two, when attribute two value be "Yes", draw the control A, when the value of attribute two is "No", to control A progress desensitization process.
In the embodiment of the present application, can identify whether control is security sensitive control according to above-mentioned attribute one and attribute two respectively Part, that is to say, that selection one of which identifies control, can also be identified according to above-mentioned attribute one and attribute two control A whether be Security sensitive control.
In addition it is also possible to control A be identified in conjunction with above-mentioned attribute one and attribute two, when the value of the corresponding attribute one of control A When for "Yes", the value of the corresponding attribute two of re-inspection control A is set if the value of the corresponding attribute two of control A is "Yes" in reception Effect is carried out according to attribute three on standby to show;If the value of the corresponding attribute two of control A is "No", do not show on the receiving device Control A.
Attribute three, the attribute that effect is shown.
Illustratively, effect shows can fill perhaps picture filling or other effects for pure color, as mosaic is imitated The additional characters such as fruit, " * " are shown.
In the mechanism that the screen that existing Android (Android) is provided is shared, the activity of security identifier is only actively set (Activity) window, which just will recognise that, comes, as shown in Figure 7 B, wherein having two in the user interface 711 that the first electronic equipment is shown A Activity window, an Activity window are the interface Activity 713 logged in where the interface of e-bank, wherein Including input frame control 712, another Activity window is the window 714 where keyboard control, wherein the interface Activity 713 are layered on the interface Activity 714.The strategy for the security identifier that Android is provided is provided with safety post using crawl The interface Activity 713 of knowledge is shown as such as 716 institute of dotted line frame in such Fig. 7 B in the user interface 715 of the second electronic equipment The blank screen identified, poor user experience.
Using the scheme of the application, referring to Fig. 7 C, the user interface 711 that the first electronic equipment is shown includes input frame control 712, it include the bank card account number of user's input in input frame control 712, in the packet of user interface 719 that the second electronic equipment show It is shown as in the input frame control 718 included such as " * " additional character, the user of such second electronic equipment just can't see the first electronics The bank card account number of user's input of equipment, while avoiding the leakage of bank card account number, can avoid the occurrence of as in Fig. 7 B Blank screen.
In another example, the login of the social software of the display screen display of the first electronic equipment as illustrated in fig. 7d The input frame control 722 that interface 721 includes, the wherein input of input frame control 722 has account and password, using the side of the application Case, it is aobvious in the input frame control 724 that the login interface 723 that the second electronic equipment show includes when sharing to the second electronic equipment Show such as " * " additional character, can protect the account shown on the first electronic equipment with password in sharing screen scene in this way, it will not It is shown on the display screen of the second electronic equipment.
In yet another example, as seen in figure 7e, the remaining sum of the payment software of the display screen display of the first electronic equipment The income control 732 that interface 731 includes is shared including information such as remaining sum and accumulated earnings using the scheme of the application When to the second electronic equipment, display such as " * " is special in the income control 734 that the remaining sum interface 733 that the second electronic equipment is shown includes Different symbol can protect the information such as the remaining sum shown on the first electronic equipment and accumulated earnings in sharing screen scene in this way, It will not be shown on the display screen of the second electronic equipment.
In yet another example, e-bank's software of the display screen display of the first electronic equipment as shown in Figure 7 F Transaction remind interface 741 include transaction remind control 742 and transaction remind control 743, including the amount of money, account and The information such as remaining sum, using the scheme of the application, when sharing to the second electronic equipment, transaction prompting circle that the second electronic equipment show Control 745 is reminded in the transaction that face 744 includes and control 746 is reminded in transaction, and display blocks picture, can protect the first electronics in this way The information such as the amount of money, account and the remaining sum that show in equipment will not be shown in the second electronic equipment in sharing screen scene.
In above-described embodiment of the application, on the one hand desensitization process can be carried out for control granularity, such as according to control The value of the attribute two of part identifies security sensitive control, can be determined whether to be shown in the second electronic equipment according to the value of attribute three On, the effect that the second electronic equipment on the other hand can be arranged in using the value of attribute three is shown, can make to show in this way Security sensitive control regions in the second electronic equipment will not be blank screen, so as to promote user experience.
It describes in detail below for the sensitive data for how identifying application level.
Multiple applications may be installed in the first electronic equipment, by taking one of application (applying A) as an example, using A It may generate in the process of running multiple using display interface.In some instances, equal using all application display interfaces of A Need to carry out desensitization process, for example applying A is bank client application, since all applications of bank client application show boundary Face likely relates to sensitive data, therefore all application display interfaces require to carry out desensitization process.In other examples In, desensitization process is needed using certain application display interfaces of A, some do not need desensitization process using display interface, for example answer It is wechat with A, since the login display interface of microblogging likely relates to sensitive data, login interface desensitizes Processing, and the blog article display interface of microblogging then can be without desensitization process.
In a kind of possible implementation, it can be identified in such a way that black and white lists are set using whether being security sensitive Using including one or more in white list for example, including the mark of one or more preset security sensitives applications in blacklist The mark of a preset non-security sensitive application.In specific implementation, the first electronic equipment can pass through the drafting from first content The mark of application is obtained in the display properties that data include, whether identification belongs to the application for including in blacklist using A, if so, Then determining that this applies A is preset security sensitive application, then desensitization process is carried out to the display interface using A, it is subsequent to draw Process processed using the display interface of A to drawing after desensitization process;If not, it is determined that this is not preset safety using A Sensitive application, subsequent drawing process using display interface to normally being drawn using A.First electronic equipment can also lead to It crosses identification and whether belongs to the application for including in white list using A, if so, determining that this is answered using A for preset non-security sensitivity With subsequent drawing process can be to the drawing using display interface using A;If not, it is determined that this is not preset using A Non-security sensitive application, subsequent drawing process using display interface to normally being drawn using A.
By the identification for being made whether to apply for security sensitive to application, some security sensitive applications, such as silver can be made The user interface of the application of row class or payment class application, will not be shared with other equipment automatically.
In alternatively possible mode, application can may include it is multiple using display interface, in some applications not It is that all application display interfaces are directed to sensitive data, it is possible to which boundary is shown to the application for being related to sensitive data in application Face is set as security sensitive interface, desensitization process can be carried out to security sensitive interface, to desensitization process in subsequent drawing process It is drawn at security sensitive interface afterwards.Be not related to sensitive data in is non-security sensitive boundary using display interface Face directly draws non-security sensitive interface in subsequent drawing process.
By taking wechat is applied as an example, in the case where some share scene, user thinks that wechat is security sensitive application, in other points Enjoying user under scene may think that wechat is security sensitive application, for point that user can voluntarily select to be suitble to special scenes Mode is enjoyed, can prompt the user with before drawing system UI and whether share wechat application, for example, the first electronic equipment is Share screen to the second electronic equipment, the first electronic equipment is in response to the operation of the click wechat application of user, and starting wechat is simultaneously It displays the prompt box, wherein prompting frame is for prompting the user to choose whether to set security sensitive application for wechat application.For another example, First terminal is showing the chat interface of wechat application, at this time if user triggers screen sharing operation, the first electronic equipment It in response to screen sharing operation, triggers screen and shares process, and display the prompt box on a display screen, wherein prompting frame is for prompting User chooses whether to set security sensitive application for wechat application.Prompting frame may include two options: be and no, the first electricity Sub- equipment may be in response to the operation that click option is, set security sensitive application for wechat application, alternatively, the first electronic equipment It may be in response to the no operation of click option, set non-security sensitive application for wechat application.
It should be understood that may have security sensitive interface in, it is also possible to have non-security sensitive interface, in the field for sharing screen Jing Zhong can also need to show each using display interface, prompt the user to choose whether to set this to using display interface Security sensitive interface.It can be found in the prompting mode for application using the prompting mode of display interface, details are not described herein again.
Below for how the sensitive data of identifying system level describes in detail.
For system level, under the scene for much sharing screen, playing the system actions such as frame, status bar, plant seeds by airplane subtitle can It can be related to sensitive data, the system action for being involved in sensitive data becomes system sensitive behavior.
In a kind of possible implementation, system is normally plotted in the system UI of local (i.e. sharing equipment) display, is drawing When the system UI that system is used to show on the receiving device, the system sensitive behavior in the drawing data of first content is identified, such as It will be identified as system sensitive behavior with the matched system action of default sensitive behavior, and desensitization process is carried out to system sensitive behavior Then drawing data after being handled is drawn to obtain the image data of the second content according to drawing data after processing.Show some In example, the system sensitives behaviors such as the system bullet frame for being related to sensitive data or status bar suggestion content can not be drawn, another In a little examples, the processing such as transparence or blurring can also be carried out to system sensitive behavior or blocks or replaces or hide.
Referring to Fig. 7 A, the first electronic equipment shares setting sun picture to the second electronic equipment, at this time the first electronic equipment The file for receiving other users transmission, at lower a moment, the user interface including setting sun picture that is shown on the first electronic equipment 701 pop up the bullet frame 702 for prompting " someone sends file to you ", using the scheme of the application, may be implemented in the second electricity Show that user interface 703, user interface 703 do not include playing frame 702 in sub- equipment.
It should be noted that the identification method of above three level can be used alone, can also be used in combination, herein not It repeats again.For example, the operation of identification security sensitive control is only carried out to the control layer in the drawing data of first content, to application Operation with two levels of system without identification security sensitive application, then in control layer after identifying security sensitive control Security sensitive control carry out desensitization process, drawing data after being handled.Later, control is drawn based on drawing data after processing Layer, application layer, the content of system layer, synthesis obtain the image data of system UI to get to the image data of the second content.Compare again Such as, three above-mentioned control layer, application layer, system layer levels are all carried out with the operation of identification sensitive data, then identifying control The corresponding sensitive data of part layer, application layer, system layer simultaneously carries out desensitization process, then respectively draw control layer, application layer, The content of system layer, synthesis obtain the image data of system UI, obtain the image data of the second content, in this way can be more thorough It identifies sensitive data, and carries out desensitization process.
By the above process, can draw not included sensitive data the second content image data.In order into one Step guarantees the safety of sharing contents, can also be to the figure of the second content after drafting obtains the image data of the second content As data progress image procossing, image data after being handled, wherein image procossing is quick from the progress of security sensitive content level Feel the identification of data, and sensitive data scratch and is removed, image data after being handled, wherein security sensitive content can be control Interior display information, text control etc., such as sensitive data involved in the content of identification control.Then picture number after handling According to being sent to the second electronic equipment, correspondingly, the second electronic equipment receives after processing after image data, according to scheming after processing As data show the second content.
Wherein, image procossing is to identify that sensitive data, disclosure level can be in control from content level The information of display, such as the content in text control, can display text information in text control, it is also possible in graphical control Image information is shown in content, graphical control, it is also possible to the control of other forms.Below with the image of the second content of identification It is illustrated for control content in data.
In order to realize identification control content, several possible realization sides presented below in the scene that screen is shared Formula.
In one possible implementation, text can be used the modes such as extract and identify character string in image, then with number It is compared according to the character string in library, this mode needs the data volume in matched database big, and the speed of service is slow.
In alternatively possible implementation, the first electronic equipment can be identified from the image data of the second content First area, and scratch except first area data, wherein the character format of the corresponding content of the data of first area with preset it is hidden The character format matching of personal letter breath, image data after being handled.
In some instances, artificial intelligence (artificial intelligence, AI) security model can be used, is known User privacy information involved in the image data of other second content content area (be referred to as sensitive data region, i.e., on State first area), such as identification identification card number, Bank Account Number etc..
Wherein, common individual privacy information is a finite aggregate, and main contents may include: name (first name and last name), in detail Thin mailing address, country, province/city, postcode, age, gender, nationality, date of birth, birthplace, marital status, education journey Degree, kinsfolk's (relationship, name etc.), telephone number, fax number, email address, address list, short message, in instant messaging Hold (social softwares such as wechat), message registration, photo, video, recording, international mobile equipment identification number (international Mobile equipment identity, IMEI), international mobile subscriber identity (international mobile Subscriber identification number, IMSI), biometric identification (fingerprint, iris etc.), general position number According to, precise position information, the configuration data of end-user electronic equipment, account ID (such as Huawei's account), Internet protocol The address (internet protocol, IP), media access control (media access control address, MAC) Location, Bank Account Number, authoritative Social recognition number (identification card number, passport No., license number, social security number etc.), credit card trade letter Breath, financial information, health and fitness information, password, facial characteristics mark, DNA (deoxyribonucleic acid, DNA) sequence and sampling, user preferences and behavioural habits, browsing record, ethnic blood lineage, political point view, religion or philosophical faith, Sexual life, previous conviction (criminal, folk crime and court document), labour union's record, children's information, license plate number etc..
The specific representation in the face on an electronic device of these above-mentioned individual privacy informations, it is practical also to have fixed lattice Formula, can be by machine learning with extracting correlation model, such as account ID (such as Huawei's account), password, IP address, MAC Location, Bank Account Number, authoritative Social recognition number (identification card number, passport No., license number, social security number etc.), IMEI, IMSI etc. are all There is fixed format data character to indicate, the feature that display length, format and content etc. all can serve as its display is mentioned It takes;Name (first name and last name), marital status, education degree, kinsfolk's (relationship, name etc.), health and fitness information race's blood for another example System, political point view, religion or philosophical faith etc. also have specific descriptor format or term text, and can pass through study Extraction feature.
Since individual privacy information is controllable limited information set, user privacy information type and coverage are limited, And the form of expression in its face at the terminal is relatively uniform, therefore the data model extracted is relatively easy, and using optimizing Data model simultaneously, whole identification includes the image-region of privacy information, without identifying specific picture material, Ke Yida To the effect for reducing calculation amount, and at present, many electronic equipments all have GPU acceleration technique, can achieve quickly identification safety Sensitive content, while the effect of content share is not influenced.
In specific implementation, it before identifying sensitive data using AI security model, needs to realize by training dataset The study and foundation of AI security model, certainly, training process can be to be carried out on the first electronic equipment, is also possible to other Equipment (such as server, other electronic equipments) completes the establishment process of AI security model using mass data collection, then will be trained To AI security model be stored in advance in the first electronic equipment, herein with no restrictions.
Below by taking the training of the first electronic equipment obtains AI security model as an example, to using the AI security model to identify sensitive number According to process be described, the embodiment of the present application is not caused to limit.
Referring to Fig. 8, the study and foundation of AI model provided by the embodiments of the present application and the flow diagram used.
As shown in figure 8, introducing the study and establishment process of AI model first.
The foundation of AI model is needed to realize by learning training data set, can be selected big before establishing AI model Spirogram piece forms picture set, and including picture and normal picture containing privacy information, user can be voluntarily in picture set Picture tag, can also be tagged to picture using Machine Method, the label of each picture can be " containing privacy information " Label or " normal " label.Then, the picture of " containing privacy information " label will be had as positive training dataset, had " normal " The picture of label is input in AI initial model and is trained as anti-training dataset, for example carries out the inspection of sensitive data feature It surveys and extracts, and then generate secret protection model, be referred to as AI security model.After generating AI security model, into one The accuracy rate of test set assessment AI security model identification security sensitive content can be used in step, and may be implemented to AI security model It is adjusted.
The process using AI security model is described further below.
Based on above content, after the image data for obtaining the second content, the image data of the second content can be inputted The sensitive data in image data into AI security model, to realize the second content of identification.Further according to the output knot of AI model Fruit judges with the presence or absence of sensitive data in the image data of the second content, if the result of AI security model output indicates the second content Image data in there are sensitive data, then the first electronic equipment carries out desensitization process to sensitive data region, handled Image data afterwards.The processing such as encoded, encrypted to image data after processing again;If the result of AI security model output indicates the Sensitive data is not present in the image data of two contents, then the processing such as encoded, encrypted to the image data of the second content.
It, can be before drawing system UI, to the control in the drawing data of first content, application in the embodiment of the present application And three hierarch recognition sensitive datas of system and desensitization process is carried out, then according to three levels after desensitization process Data are drawn to obtain the image data of the second content, later, security sensitive content level can be directed to again, using the safe mould of AI Type carries out sensitive data identification to the image data of the second content, and to sensitive data region further progress desensitization process, obtains Image data after to processing may further ensure that the safety to the second electronic equipment sharing contents in this way.
In the embodiment of the present application, image procossing is carried out in image data of first equipment to second content, is obtained everywhere After reason after image data, due to including the first area scratched except data in image data after processing, in this way when showing the One region will appear blank screen, and in order to promote user experience, in a kind of possible implementation, the first electronic equipment is to firstth area Domain carries out rendering processing, so that rendering other contents on the first area, for example does not include the content of sensitive data, then again will Rendered image data is sent to the second electronic equipment, so that the second electronic equipment is shown in second according to the image data received Rong Shi, first area are not blank screens, so as to promote user experience.
In another implementation, image data after processing can be sent to the second electronics and set by the first electronic equipment Standby, wherein image data includes the stingy first area except data after processing, the second electronic equipment is received to be set from the first electronics Image data after standby processing, and rendering processing is carried out to the first area in image data after the processing, then according to warp Crossing rendering, treated that image data shows the second content on the display screen.Compared to former implementation, the realization Mode can reduce the data volume that the first electronic equipment sends data to the second electronic equipment.
Below with reference to Fig. 9, (i.e. security sensitive application processing, security sensitive control in a manner of the identifying processing of four levels Processing, system sensitive behavior processing and security sensitive contents processing) be used in combination for, be discussed in detail and above-mentioned sharing can be achieved A kind of possible mode of content and method.As shown in figure 9, the sharing contents method is applied in the first electronic equipment, this method Include the following steps:
Step 901, the mark of application to be shared is obtained.
Step 902, judge the default application identities of application to be shared identified whether to include in blacklist;If so, Step 903 is executed, if it is not, thening follow the steps 904;
Above-mentioned steps 901- step 902 is security sensitive applicable procedures.
Step 903, it determines wait sharing using being security sensitive application, prompting user's processing or using other safeguard protections Behavior.
After step 903, system sensitive behavior processing and security sensitive content management process, i.e. step are directly carried out After 903, step 908 is directly carried out, does not execute step 904- step 907.
Step 904, the control in the current interface of application to be shared is traversed, later, continues step 905.
Step 905, judge whether control is security sensitive control;If so, 906 are thened follow the steps, if it is not, thening follow the steps 907;
Step 906, according to the effect display properties of security sensitive control, security sensitive control display area is covered.
Herein, it is only illustrated by taking covering effect as an example, but is not limited to this effect, effect display properties may refer to State the related content of attribute three.
Step 907, the interface of system synthesis application level.
Above-mentioned steps 903- step 907 is security sensitive control treatment process.
Step 908, system sensitive behavior is judged whether there is;If so, 909 are thened follow the steps, if it is not, thening follow the steps 910。
Wherein, system sensitive behavior may include being related to the status bar content, control group content, system bullet of sensitive data Frame, using class bullet frame etc..
Step 909, filtration system sensitive behavior.
Illustratively, as shown in Figure 7 A, " having in the user interface 701 that the first electronic equipment of system sensitive behavior is shown People sends file to you " frame 702 is played, filter the bullet frame 702, it can draw the bullet frame 702, show in the second electronic equipment It does not include the bullet frame 702 in user interface 703.
Above-mentioned steps 908- step 909 is system sensitive behavior treatment process.
Illustrate in conjunction with Fig. 3 A, above-mentioned steps 901-909 can be realized by Streaming Media safety management module 312.
Step 910, according to the interface at the interface of application level and system action, a frame image data is synthesized.
Illustratively, the control in content to be drawn can be formed and apply display interface, will using display interface and System UI synthesizes user interface (referred to hereinabove as system interface), i.e. a frame image data together.
Illustrate in conjunction with Fig. 3 A, above-mentioned steps 910 can be realized by multi-media module 313.
Step 911, identify a frame image data with the presence or absence of security sensitive content;If so, 912 are thened follow the steps, if It is no, then follow the steps 913;
Step 912, the display area of security sensitive content is subjected to covering treatment, image data after being handled.
Certainly, it is also possible here to use scratch remove, replace, hide etc. modes to the display area of security sensitive content at It manages, only illustrates by taking covering treatment as an example in step 912.
Above-mentioned steps 911- step 912 is security sensitive content management process, is illustrated in conjunction with Fig. 3 A, above-mentioned steps 910 It can be realized by data processing module 314.
Step 913, image data after processing is encoded.Later, the image after sending coding to the second electronic equipment Data.
By embodiment shown in Fig. 9, the content that the display screen display of the first electronic equipment may be implemented is selective Be shown in the second electronic equipment, that is, be involved in sensitive data content handled after so that the sensitivity identified Data will not be shown in the second electronic equipment, so as to protect the personal secrets of the first electronic equipment.
After being handled through the foregoing embodiment after image data, in order to further increase the safety of data transmission Property, image data after processing can be encoded, optionally, be schemed after can also being encrypted to coded data As data, image data after encryption is then sent to the second electronic equipment, in this way if after other equipment receive the encryption Image data is also unable to get image data after true processing.Correspondingly, the second electronic equipment is schemed after receiving the encryption As after data, be decrypted, decode handled after image data, and show on a display screen handle after image data.
Angle in above-mentioned embodiment provided by the present application, from the first electronic equipment (electronic equipment 100) as executing subject Degree is described method provided by the embodiments of the present application.It is each in above-mentioned method provided by the embodiments of the present application in order to realize Function, mobile device may include hardware configuration and/or software module, be added with hardware configuration, software module or hardware configuration soft The form of part module realizes above-mentioned each function.Some function in above-mentioned each function is with hardware configuration, software module or hard Part structure adds the mode of software module to execute, the specific application and design constraint depending on technical solution.
The embodiment of the present application also provides the graphic user interface GUI in a kind of electronic equipment, which has display Screen, memory, one or more processors, one or more of processors are for executing one be stored in the memory Or multiple computer programs, the graphic user interface may include: that the electronic equipment executes above-mentioned first electronic equipment and executes Method, or the graphic user interface that while executing the method that above-mentioned second electronic equipment executes shows.
It is used in above-described embodiment, based on context, term " when ... " can be interpreted to mean " if ... " or " ... it is rear " or " in response to determination ... " or " in response to detecting ... ".Similarly, based on context, phrase " when in determination ... " Or " if detecting (condition or event stated) " can be interpreted to mean " if it is determined that ... " or " in response to true It is fixed ... " or " when detecting (condition or event stated) " or " in response to detecting (condition or event stated) ".
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real It is existing.When implemented in software, it can entirely or partly realize in the form of a program product.Described program product includes one Or multiple computer instructions.When loading and execute on computers described program instruction, entirely or partly generate according to this Shen It please process or function described in embodiment.The computer can be general purpose computer, special purpose computer, computer network or Other programmable devices of person.The computer instruction may be stored in a computer readable storage medium, or calculate from one Machine readable storage medium storing program for executing is transmitted to another computer readable storage medium, for example, the computer instruction can be from a net Website, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line) or wireless (example Such as infrared, wireless, microwave) mode transmitted to another web-site, computer, server or data center.It is described Computer readable storage medium can be any usable medium that computer can access or include one or more available The data storage devices such as medium integrated server, data center.The usable medium can be magnetic medium, (for example, soft Disk, hard disk, tape), optical medium (such as DVD) or semiconductor medium (such as solid state hard disk) etc..
For purposes of explanation, the description of front is described by reference to specific embodiment.However, above Illustrative discuss is not intended to be the precise forms disclosed in being also not intended to for the application being restricted in detail.According to Above teaching content, many modifications and variations are all possible.Selection and description embodiment are to fully state The principle and its practical application of the application, with so that others skilled in the art can make full use of have be suitable for The application of the various modifications for the special-purpose conceived and various embodiments.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, the process Relevant hardware can be instructed to complete by computer program, which can be stored in computer-readable storage medium, should Program is when being executed, it may include such as the process of above-mentioned each method embodiment.And storage medium above-mentioned includes: ROM or deposits at random Store up the medium of the various program storage codes such as memory body RAM, magnetic or disk.

Claims (10)

1. a kind of method of sharing contents, applied to first electronic equipment with display screen, which is characterized in that the method Include:
Detect the first operation for sharing screen to the second electronic equipment;
In response to first operation, the communication connection between second electronic equipment is established;
Obtain the drawing data of first content to be drawn;The drawing data includes that control layer, application layer, system layer are corresponding The position of view, size, display content, display properties;
Based on the drawing data of the first content, control layer, application layer, the corresponding content of system layer are drawn respectively, is synthesized To the image data of the first content;
Identify control layer, application layer and the corresponding sensitive data of system layer in the drawing data of the first content, and right The sensitive data carries out drawing data after desensitization process is handled;
Based on drawing data after the processing, control layer, application layer, the corresponding content of system layer are drawn respectively, synthesis obtains the The image data of two contents;
The first content is shown on the display screen according to the image data of the first content, and to second electronics Equipment sends the image data of second content.
2. the method as described in claim 1, which is characterized in that described to send second content to second electronic equipment Image data, comprising:
Image procossing, image data after being handled are carried out to the image data of second content;Described image is handled It identifies first area, and scratches the data except the first area, wherein the character format of the corresponding content of the data of first area It is matched with the character format of default privacy information;
Image data after sending the processing to second electronic equipment.
3. method according to claim 2, which is characterized in that the identification first area, comprising:
The first area in the image data of second content is identified using artificial intelligence AI security model;Wherein, institute State what the picture with privacy information label and the picture with normal tag according to AI security model were trained.
4. method as claimed in claim 2 or claim 3, which is characterized in that described image processing further include:
Rendering processing is carried out to the first area scratched except data.
5. the method according to claim 1, which is characterized in that the drawing data of the identification first content In control layer, application layer and the corresponding sensitive data of system layer, and to the sensitive data carry out desensitization process obtain everywhere Drawing data after reason, comprising:
Identify the security sensitive application in the drawing data of the first content, the security sensitive is using for Apply Names and in advance If the application of the name-matches of security sensitive application;
Identify that the security sensitive control in the drawing data of the first content, the security sensitive control are security attribute information Value be preset value control, alternatively, the security sensitive control is control with the name-matches of default security sensitive control;
Identify the system sensitive behavior in the drawing data of the first content;The system sensitive behavior and default sensitive behavior Matching;
Corresponding data, the security sensitive control pair are applied to the security sensitive in the drawing data of the first content The corresponding data of the data and the system sensitive behavior answered carry out desensitization process, drawing data after being handled.
6. a kind of method of sharing contents, applied to second electronic equipment with display screen, which is characterized in that the method Include:
When receiving the request of the sharing screen from first electronic equipment, the second electronic equipment is established and described first Communication connection between electronic equipment;
Image data after processing of the reception from the first electronic equipment;Image data includes stingy except the of data after the processing One region;
Rendering processing carried out to the first area in image data after the processing, and according to by rendering treated picture number According to showing the second content on the display screen.
7. the graphic user interface in a kind of electronic equipment, which is characterized in that the electronic equipment have display screen, camera, Memory and one or more processors, one or more of processors are used to execute and store in the memory One or more computer programs, which is characterized in that the graphic user interface includes that the electronic equipment is executed as right is wanted The graphic user interface shown when method described in asking any one of 1 to 6.
8. a kind of electronic equipment, which is characterized in that including processor and memory;
The memory is stored with one or more computer programs;
When one or more computer programs of memory storage are executed by the processor, so that the electronic equipment It is able to carry out method as claimed in claim 1 to 5, alternatively, executing method as claimed in claim 6.
9. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence, when computer program is run on an electronic device, so that the electronic equipment is executed as described in claim 1 to 5 is any Method, alternatively, execute method as claimed in claim 6.
10. a kind of computer program product comprising instruction, which is characterized in that when the computer program product is in electronic equipment When upper operation, so that the electronic equipment executes method as claimed in claim 1 to 5, alternatively, executing such as claim Method described in 6.
CN201910498149.XA 2019-06-10 2019-06-10 Method and electronic equipment for sharing content Active CN110378145B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910498149.XA CN110378145B (en) 2019-06-10 2019-06-10 Method and electronic equipment for sharing content
PCT/CN2020/095022 WO2020248955A1 (en) 2019-06-10 2020-06-09 Content sharing method and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910498149.XA CN110378145B (en) 2019-06-10 2019-06-10 Method and electronic equipment for sharing content

Publications (2)

Publication Number Publication Date
CN110378145A true CN110378145A (en) 2019-10-25
CN110378145B CN110378145B (en) 2022-04-22

Family

ID=68250026

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910498149.XA Active CN110378145B (en) 2019-06-10 2019-06-10 Method and electronic equipment for sharing content

Country Status (2)

Country Link
CN (1) CN110378145B (en)
WO (1) WO2020248955A1 (en)

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110865654A (en) * 2019-12-06 2020-03-06 河南送变电建设有限公司 Power grid unmanned aerial vehicle inspection defect processing method
CN110989950A (en) * 2019-11-15 2020-04-10 维沃移动通信有限公司 Sharing control method and electronic equipment
CN111131882A (en) * 2019-12-30 2020-05-08 联想(北京)有限公司 Screen recording method and device and electronic equipment
CN111143880A (en) * 2019-12-27 2020-05-12 中电长城网际系统应用有限公司 Data processing method and device, electronic equipment and readable medium
CN111177694A (en) * 2019-12-16 2020-05-19 华为技术有限公司 Method and device for processing data
CN111198954A (en) * 2019-11-28 2020-05-26 深圳市跨越新科技有限公司 Method and system for structured analysis of order placement address
CN111290721A (en) * 2020-01-20 2020-06-16 北京大米未来科技有限公司 Online interaction control method, system, electronic device and storage medium
CN111290722A (en) * 2020-01-20 2020-06-16 北京大米未来科技有限公司 Screen sharing method, device and system, electronic equipment and storage medium
CN111309938A (en) * 2020-01-22 2020-06-19 恒大新能源汽车科技(广东)有限公司 Multimedia file processing method and device
CN111338721A (en) * 2020-01-20 2020-06-26 北京大米未来科技有限公司 Online interaction method, system, electronic device and storage medium
CN111488190A (en) * 2020-03-31 2020-08-04 腾讯科技(深圳)有限公司 Screen sharing method and device, computer equipment and storage medium
WO2020248955A1 (en) * 2019-06-10 2020-12-17 华为技术有限公司 Content sharing method and electronic device
CN112511601A (en) * 2020-11-16 2021-03-16 北京仁光科技有限公司 Multi-screen data interaction system and multi-screen data interaction method
CN113050900A (en) * 2021-03-17 2021-06-29 平安普惠企业管理有限公司 Screen sharing method, device, equipment and storage medium
US11082374B1 (en) 2020-08-29 2021-08-03 Citrix Systems, Inc. Identity leak prevention
CN113222809A (en) * 2021-05-21 2021-08-06 支付宝(杭州)信息技术有限公司 Picture processing method and device for realizing privacy protection
US11165755B1 (en) 2020-08-27 2021-11-02 Citrix Systems, Inc. Privacy protection during video conferencing screen share
CN113704824A (en) * 2021-08-31 2021-11-26 平安普惠企业管理有限公司 Synchronous generation method, device and equipment of page guide mark and storage medium
CN113778360A (en) * 2021-08-20 2021-12-10 荣耀终端有限公司 Screen projection method and electronic equipment
CN113791713A (en) * 2021-09-01 2021-12-14 远峰科技股份有限公司 Vehicle multi-screen display window sharing method and device
US11201889B2 (en) 2019-03-29 2021-12-14 Citrix Systems, Inc. Security device selection based on secure content detection
CN114553844A (en) * 2022-03-09 2022-05-27 润芯微科技(江苏)有限公司 Method for sharing screen during video
US11361113B2 (en) 2020-03-26 2022-06-14 Citrix Systems, Inc. System for prevention of image capture of sensitive information and related techniques
CN114827519A (en) * 2022-04-08 2022-07-29 咪咕文化科技有限公司 Processing method and device for sharing content, sharing terminal and storage medium
CN114860178A (en) * 2021-01-18 2022-08-05 华为技术有限公司 Screen projection method and electronic device
US11450069B2 (en) 2018-11-09 2022-09-20 Citrix Systems, Inc. Systems and methods for a SaaS lens to view obfuscated content
US11539709B2 (en) 2019-12-23 2022-12-27 Citrix Systems, Inc. Restricted access to sensitive content
US11544415B2 (en) 2019-12-17 2023-01-03 Citrix Systems, Inc. Context-aware obfuscation and unobfuscation of sensitive content
US11582266B2 (en) 2020-02-03 2023-02-14 Citrix Systems, Inc. Method and system for protecting privacy of users in session recordings
WO2024045764A1 (en) * 2022-08-31 2024-03-07 中兴通讯股份有限公司 Display method and apparatus, terminal, electronic device and storage medium
WO2024051634A1 (en) * 2022-09-06 2024-03-14 华为技术有限公司 Screen projection display method and system, and electronic device
US11977932B2 (en) 2020-08-27 2024-05-07 Honor Device Co., Ltd. Information sharing method and apparatus, terminal device, and storage medium
WO2024109509A1 (en) * 2022-11-25 2024-05-30 华为技术有限公司 Content acquisition method, readable storage medium, program product and electronic device

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118915939A (en) * 2020-12-18 2024-11-08 华为技术有限公司 Application sharing method, electronic device and storage medium
CN112989408A (en) * 2021-03-03 2021-06-18 Oppo广东移动通信有限公司 Screenshot processing method, screenshot processing device, electronic equipment and storage medium
CN114692202B (en) * 2022-03-31 2024-07-30 马上消费金融股份有限公司 Image processing method, device, electronic equipment and storage medium
CN116049867B (en) * 2022-07-21 2024-04-02 荣耀终端有限公司 Anti-fraud method, graphical interface and related device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100907A (en) * 2014-04-28 2015-11-25 宇龙计算机通信科技(深圳)有限公司 Selective screen projection method and device thereof
CN106603667A (en) * 2016-12-16 2017-04-26 北京小米移动软件有限公司 Screen information sharing method and device
CN107333118A (en) * 2017-07-17 2017-11-07 上海青橙实业有限公司 The control method and device of project content
CN107580105A (en) * 2017-07-26 2018-01-12 努比亚技术有限公司 A kind of screen sharing method, terminal and computer-readable recording medium
US20180121663A1 (en) * 2016-11-01 2018-05-03 Microsoft Technology Licensing, Llc Sharing Protection for a Screen Sharing Experience
CN108038396A (en) * 2017-12-05 2018-05-15 广东欧珀移动通信有限公司 Screen recording method and device and terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180053003A1 (en) * 2016-08-18 2018-02-22 Qualcomm Incorporated Selectively obfuscating a portion of a stream of visual media that is streamed to at least one sink during a screen-sharing session
CN108197495A (en) * 2018-01-16 2018-06-22 挖财网络技术有限公司 The guard method of sensitive information and device in application program
CN110378145B (en) * 2019-06-10 2022-04-22 华为技术有限公司 Method and electronic equipment for sharing content

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100907A (en) * 2014-04-28 2015-11-25 宇龙计算机通信科技(深圳)有限公司 Selective screen projection method and device thereof
US20180121663A1 (en) * 2016-11-01 2018-05-03 Microsoft Technology Licensing, Llc Sharing Protection for a Screen Sharing Experience
CN106603667A (en) * 2016-12-16 2017-04-26 北京小米移动软件有限公司 Screen information sharing method and device
CN107333118A (en) * 2017-07-17 2017-11-07 上海青橙实业有限公司 The control method and device of project content
CN107580105A (en) * 2017-07-26 2018-01-12 努比亚技术有限公司 A kind of screen sharing method, terminal and computer-readable recording medium
CN108038396A (en) * 2017-12-05 2018-05-15 广东欧珀移动通信有限公司 Screen recording method and device and terminal

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11450069B2 (en) 2018-11-09 2022-09-20 Citrix Systems, Inc. Systems and methods for a SaaS lens to view obfuscated content
US11201889B2 (en) 2019-03-29 2021-12-14 Citrix Systems, Inc. Security device selection based on secure content detection
WO2020248955A1 (en) * 2019-06-10 2020-12-17 华为技术有限公司 Content sharing method and electronic device
CN110989950A (en) * 2019-11-15 2020-04-10 维沃移动通信有限公司 Sharing control method and electronic equipment
CN111198954B (en) * 2019-11-28 2023-08-22 深圳市跨越新科技有限公司 Method and system for analyzing ordering address structuring
CN111198954A (en) * 2019-11-28 2020-05-26 深圳市跨越新科技有限公司 Method and system for structured analysis of order placement address
CN110865654A (en) * 2019-12-06 2020-03-06 河南送变电建设有限公司 Power grid unmanned aerial vehicle inspection defect processing method
CN111177694A (en) * 2019-12-16 2020-05-19 华为技术有限公司 Method and device for processing data
US11544415B2 (en) 2019-12-17 2023-01-03 Citrix Systems, Inc. Context-aware obfuscation and unobfuscation of sensitive content
US11539709B2 (en) 2019-12-23 2022-12-27 Citrix Systems, Inc. Restricted access to sensitive content
CN111143880B (en) * 2019-12-27 2022-06-07 中电长城网际系统应用有限公司 Data processing method and device, electronic equipment and readable medium
CN111143880A (en) * 2019-12-27 2020-05-12 中电长城网际系统应用有限公司 Data processing method and device, electronic equipment and readable medium
CN111131882A (en) * 2019-12-30 2020-05-08 联想(北京)有限公司 Screen recording method and device and electronic equipment
CN111338721A (en) * 2020-01-20 2020-06-26 北京大米未来科技有限公司 Online interaction method, system, electronic device and storage medium
CN111290722A (en) * 2020-01-20 2020-06-16 北京大米未来科技有限公司 Screen sharing method, device and system, electronic equipment and storage medium
CN111290721A (en) * 2020-01-20 2020-06-16 北京大米未来科技有限公司 Online interaction control method, system, electronic device and storage medium
CN111309938A (en) * 2020-01-22 2020-06-19 恒大新能源汽车科技(广东)有限公司 Multimedia file processing method and device
US11582266B2 (en) 2020-02-03 2023-02-14 Citrix Systems, Inc. Method and system for protecting privacy of users in session recordings
US11361113B2 (en) 2020-03-26 2022-06-14 Citrix Systems, Inc. System for prevention of image capture of sensitive information and related techniques
CN111488190B (en) * 2020-03-31 2021-10-15 腾讯科技(深圳)有限公司 Screen sharing method and device, computer equipment and storage medium
CN111488190A (en) * 2020-03-31 2020-08-04 腾讯科技(深圳)有限公司 Screen sharing method and device, computer equipment and storage medium
US11165755B1 (en) 2020-08-27 2021-11-02 Citrix Systems, Inc. Privacy protection during video conferencing screen share
WO2022041058A1 (en) * 2020-08-27 2022-03-03 Citrix Systems, Inc. Privacy protection during video conferencing screen share
US11977932B2 (en) 2020-08-27 2024-05-07 Honor Device Co., Ltd. Information sharing method and apparatus, terminal device, and storage medium
US11082374B1 (en) 2020-08-29 2021-08-03 Citrix Systems, Inc. Identity leak prevention
US11627102B2 (en) 2020-08-29 2023-04-11 Citrix Systems, Inc. Identity leak prevention
CN112511601B (en) * 2020-11-16 2021-12-07 北京仁光科技有限公司 Multi-screen data interaction system and multi-screen data interaction method
CN112511601A (en) * 2020-11-16 2021-03-16 北京仁光科技有限公司 Multi-screen data interaction system and multi-screen data interaction method
CN114860178A (en) * 2021-01-18 2022-08-05 华为技术有限公司 Screen projection method and electronic device
CN113050900B (en) * 2021-03-17 2024-01-23 平安普惠企业管理有限公司 Screen sharing method, device, equipment and storage medium
CN113050900A (en) * 2021-03-17 2021-06-29 平安普惠企业管理有限公司 Screen sharing method, device, equipment and storage medium
CN113222809A (en) * 2021-05-21 2021-08-06 支付宝(杭州)信息技术有限公司 Picture processing method and device for realizing privacy protection
CN113778360A (en) * 2021-08-20 2021-12-10 荣耀终端有限公司 Screen projection method and electronic equipment
CN113778360B (en) * 2021-08-20 2022-07-22 荣耀终端有限公司 Screen projection method and electronic equipment
CN113704824A (en) * 2021-08-31 2021-11-26 平安普惠企业管理有限公司 Synchronous generation method, device and equipment of page guide mark and storage medium
CN113791713A (en) * 2021-09-01 2021-12-14 远峰科技股份有限公司 Vehicle multi-screen display window sharing method and device
CN114553844B (en) * 2022-03-09 2022-09-06 润芯微科技(江苏)有限公司 Method for sharing screen during video
CN114553844A (en) * 2022-03-09 2022-05-27 润芯微科技(江苏)有限公司 Method for sharing screen during video
CN114827519A (en) * 2022-04-08 2022-07-29 咪咕文化科技有限公司 Processing method and device for sharing content, sharing terminal and storage medium
WO2024045764A1 (en) * 2022-08-31 2024-03-07 中兴通讯股份有限公司 Display method and apparatus, terminal, electronic device and storage medium
WO2024051634A1 (en) * 2022-09-06 2024-03-14 华为技术有限公司 Screen projection display method and system, and electronic device
CN117714759A (en) * 2022-09-06 2024-03-15 华为技术有限公司 A method, system and electronic device for screen projection
WO2024109509A1 (en) * 2022-11-25 2024-05-30 华为技术有限公司 Content acquisition method, readable storage medium, program product and electronic device

Also Published As

Publication number Publication date
WO2020248955A1 (en) 2020-12-17
CN110378145B (en) 2022-04-22

Similar Documents

Publication Publication Date Title
CN110378145A (en) A kind of method and electronic equipment of sharing contents
WO2018095279A1 (en) Method and apparatus for security question generation and identity verification
CN111767554B (en) Screen sharing method and device, storage medium and electronic equipment
KR102206060B1 (en) Effect display method of electronic apparatus and electronic appparatus thereof
CN107924288A (en) Electronic equipment and its method for carrying out perform function using speech recognition
CN104158722B (en) For light information push method, device, terminal and the server applied
CN106462713B (en) The interface display method and terminal of terminal
WO2021018169A1 (en) Privacy protection method for electronic device, and electronic device
WO2016165557A1 (en) Method and device for realizing verification code
CN108289244A (en) Video caption processing method, mobile terminal and computer readable storage medium
WO2015055095A1 (en) Identity authentication method and device and storage medium
US20130147705A1 (en) Display apparatus and control method thereof
CN112287234B (en) Information retrieval method, device and storage medium
CN107810472A (en) Electronic installation and the method for the display for controlling panoramic picture
CN104967637B (en) operation processing method, device and terminal
CN107590770A (en) Image obscures encryption method, mobile terminal and storage medium
CN110457935A (en) A kind of authority configuring method and terminal device
CN108171034A (en) A kind of method and terminal for protecting privacy
JP2022552862A (en) Display method and electronic equipment
CN115426521A (en) Method, electronic device, medium, and program product for screen capture
US10185760B2 (en) Method and device for forming group using communication history information
CN116257159A (en) Multimedia content sharing method, device, equipment, medium and program product
CN111597592B (en) Input method, input device and mobile terminal
CN108845732A (en) A kind of information display method and terminal device
US20150032816A1 (en) Information processing apparatus, information processing method, and recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant